Skip to main content
Version: NG-2.16

Azure CDN WAF Policy

Introduction

Azure Content Delivery Network (CDN) Web Application Firewall (WAF) policies offer centralized protection against common web threats and vulnerabilities, such as SQL injection, cross-site scripting (XSS), and other OWASP Top 10 risks. Monitoring CDN WAF is essential to ensure the ongoing health, performance, and effectiveness of these security policies across all configured CDN endpoints.

Getting Started

Compatibility

The Azure CDN WAF Policy O11ySource supports Azure CDN WAF Policy Services within standard lifecycle support.

Data Collection Method

Telemetry data for Azure CDN WAF Policy comprises various metrics that monitor event processing performance, resource utilization, and operational health. Our internal agent, deployed within the vuSmartMaps environment, collects these metrics using a pull method.

Prerequisites

Dependent Configuration

To configure this O11ySource, create a 'credential' of type 'azure' under the 'Definition' tab.

Inputs for Configuring Data Source

  • Policy Name: Enter the Policy Name of Azure CDN WAF
  • Resource ID: A unique identifier for the Azure resource.
  • Credential: Client ID, Client Secret, Subscription ID and Tenant ID associated to the credential.
  • Period (in seconds): Time interval for polling data from the Azure App Gateway. Period should be between 60 seconds – 3000 seconds.

Firewall Requirement

To collect data from this O11ySource, ensure the following ports are opened:

Source IPDestination IPDestination PortProtocolDirection
vuSmartMaps IPAzure Monitor IP443*TCPOutbound

*Before providing the firewall requirements, please update the port based on the customer environment.

Configuring the Target

Health and performance metrics of Azure CDN WAF Policy are collected through Azure Monitor service. Thus, Azure Monitor must be enabled in your Azure account. Azure CDN WAF Services should have available instances for which monitoring is enabled.

An IAM role or user with the following permissions to access Azure Key Vault metrics through Azure Monitor:

  • Grant the Azure AD application, for which you've obtained the Client ID and Client Secret, the "Reader" role or a custom role specifically assigned with the Microsoft.Insights/metrics/read permission.

Configuration Steps

  • Enable the O11ySource.
  • Select the sources tab and press the + button to add a new instance that has to be monitored.
  • Provide the required configurations:
  • *Resource Name
  • *Period (in seconds)
  • *Credential
  • *Resource ID
  • Click Save to close the data source window.

Metrics Collected

NameDescriptionData Type
@timestampOriginal timestamp of the agent in string formatString
timestampPrecise timestamp of the agent with millisecondsDateTime64(3)
resource_groupResource group in AzureString
subscription_idAzure subscription identifierString
resource_nameName of the Azure resourceString
nameMetric name of the Azure resource(e.g., capacity, requests etc.)String
minimumMinimum value of the metric over the periodUInt64
maximumMaximum value of the metric over the periodUInt64
totalTotal value of the metric over the periodUInt64
averageAverage value of the metric over the periodFloat64
namespacelogical container that organizes and manages related resourcesString
countIndicate the number of occurrences or events of a specific type within a given time frame.UInt64
targetRefers to the specific Azure CDN WAF instance being monitored, accessed, or targeted for operations such as key retrieval, secret access, policy updates, or metric collection.String
resource_regionSpecifies the Azure geographic location where the CDN WAF resource is deployed and hosted.String